How is ClearID different from traditional access control systems? - ClearID

Genetec ClearID™ User Guide

Applies to
ClearID
Last updated
2024-04-09
Content type
Guides > User guides
Language
English
Product
ClearID

Use the following information to help you understand how Genetec ClearID™ is different from traditional access control systems.

In traditional access control systems, security personnel are constantly involved to grant or deny access to physical locations:
  • Security personnel must verify with the room owners before granting access to someone.
  • When the access is no longer required, the person never goes back to security to ask to be removed from the room.
  • Most sites do not track or record why access was required.

In ClearID, the self-service Web portal reduces effort and increases flexibility by using workflows when employees, managers, and owners of the different secure areas request and grant access.

Requests are processed as follows:
  1. Separate requests and approval workflows are created for each request.

    Each request includes the requester identity, time of request, reason for request, and other audit trail information.

  2. Each request generates email notifications for the requester and for approvers.
  3. After the request summary is confirmed, it is automatically assigned to the right individuals for approval.
  4. The employee manager, area owners, and other approvers receive an email requiring them to approve, deny, or modify the submitted request.
  5. After the approval process occurs, the requester receives an email notifying them whether their request was approved or rejected.
NOTE: Access, visit, or identity requests can be limited to a specific period, as opposed to the traditional method of an infinite period.

Using the self-service portal, employees can request access to specific areas in the same building or in a different site. Even when the site is managed by a different instance of Security Center.

If a person is traveling for the first time to an office managed by a different instance of Synergis™, the system automatically creates a cardholder and synchronizes all the credentials a few hours before the travelers arrive on site. On the last day of the trip, as specified in the access request, the system automatically revokes access to the secure area.